Informationn Security And Risk Management Flashcards

1
Q

Risk management

A

The process of minimising potential losses.

In the case a loss occurs, risk management practices determine how to reduce the costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk assessment techniques

A

Risk assessment techniques determine the level of risk and determine if the level of risk exceeds an organisation’s risk tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NIST

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 Risk management processes

A
  • framing
  • assessing
  • monitoring
  • responding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk assessment

A

Activities that are carried out to discover, describe, analyse and evaluate risks. They can be quantitative, quantitative or both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Qualitative risk assessment

A

Collects descriptive information, including information that cannot be reduced to measurable values.

It will typically identify a number is characteristics about an asset or activity, including:
- classification
- vulnerabilities
- threats
- threat probability
- impact
- countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classification

A

Assets may be classified according to risk level, business function of the sensitivity or criticality of data stored or processed by the asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerabilities

A

These are weaknesses in design, configuration, documentation, procedure or implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats

A

Potential activities that would exploit specific vulnerabilities and result in a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat probability

A

An expression of the likelihood that a specific threat will be carried out, usually expressed in Low/Medium/High or simple numeric scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Impact

A

An expression of the influence upon the organisation if a threat was carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Countermeasures

A

These are actual or proposed measures that reduce the risk associated with vulnerabilities or threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Quantitative Risk Assessment

A

Quantitative assessments tata assessing and evaluating risks as discrete mathematical valuations.

It can be thought as an extension of qualitative risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset value

A

This is a dollar figure that may represent the replacement cost of an asset but it could also represent income derived from the use of that asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exposure Factor

A

The proportion of an asset’s value that is likely to be lost through a particular threat, usually expressed as a percentage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Single Loss Expectancy

A

SLE is the cost of a single Loss through the single event relisation of a particular threat. This is the result of the calculation:

SLE = asset value ($) x exposure Factor (%)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARO

A

Annualized Rate of Occurance

The probability that a loss will occur in a year’s time.

18
Q

ALE

A

Annual Loss Expectancy

The yearly estimate of a loss of an asset, calculated as follows:

ALE = ARO X SLE

19
Q

Costs of Countermeasures

A

Each countermeasure had a specific cost associated with it. This may be the first of additional protective equipment, software or Labour.

20
Q

Changes in exposure Factor

A

A specific countermeasure may have an impact on a specific threat.

21
Q

Changes in single Loss Expectancy

A

Specific countermeasures may influence the influence the probability that a loss will occur.

22
Q

Risk Assessment Methodologies

A

OCTAVE
FRAP
Spanning Tree Analysis
NIST 800-30

23
Q

Risk Treatment

A

Once a risk assessment is performed an organisation’s management can begin the process of determining what steps can be taken to manage the risk identified.

The fire general Autriche to risk management are:

  • Risk acceptance
  • Risk avoidance
  • Risk mitigation
  • Risk transfer
24
Q

Risk Avoidance

A

The associated activity that introduced the risk is discontinued.

25
Q

Risk Mitigation

A

This involves the use of countermeasure to reduce the risks initially identified in the risk analysis.

26
Q

Risk Acceptance

A

The act of foregoing mitigation of low impact risks. Accepting the risks.

27
Q

Risk transfer

A

Typically involves the use of insurance as a mean of mitigating risks.

28
Q

Residual risk

A

In a given risk situation, generally only some of the risk can be avoided, reduced or transferred. They is always some remaining risk, called residual risk.

29
Q

Security Management Concepts

A

Security control
CIA Triad
Defense in Depth
Single points of failure
Fail Open, Fail Closed, Fail Soft
privacy

30
Q

ISO 27001 Standard

A

Is a top down process approach to security Management that requires continuous improvement in an organisation security Management system

31
Q

Security Controls

A

The measures that are taken to reduce risks through the origination and enforcement of security policies.

The types of controls used are:
- Detective
- Deterrent
- Preventive
- Corrective
- Recovery
- Compensating

32
Q

CIA Triad

A

The core principles of information security are:
- Confidentiality
- Integrity
- Availability

33
Q

Confidentiality

A

The principle of Confidentiality asserts that only properly authorized parties can access information and functions.

34
Q

Integrity

A

The principle of Integrity asserts that information and functions can be added, altered or removed only by authorized persons and means.

35
Q

Availability

A

The principle of Availability asserts that systems, functions and data must be available when an authorized user needs to access them.

Different levels of Availability exist based upon predefined parameters regarding levels and types of service

36
Q

Defense in Depth

A

Defense in Depth implies a layered defense consisting of two or more protective methods that protect some asset.

It defines a process balancing protection capability, cost, performance and operations considerations. Some characteristics of defense in Depth:

  • heterogeneity
  • holistic/comprehensive protection

The objectives of defense in Depth is to reduce the probability that a threat can act upon an asset. This occurs in three ways:

  • single vulnerability
  • single malfunction
  • Fail open
37
Q

Heterogeneity in defense in Depth

A

A good defense in Depth mechanism may contain different types of protective mechanisms

38
Q

Comprehensive protection in defense in Depth

A

Each later of the defense fully protects an asset against the type of threat that the defense is designed to block

39
Q

Single vulnerability

A

If one of the components of a Defense in Depth had an exploitable vulnerability, chances are that another layer in the defense still not have the same vulnerability.

40
Q

Single malfunction

A

If one of the components of a Defense in Depth malfunctions, chances are that another layer in the defense will not malfunction.

41
Q

Fail Open in Defense in Depth

A

If one of the components in a defense in depth fails open, the other components will continue to operate and protect the asset